Probably you’ll be better off with the official docs which base installation on an easy-to-use wizard. This guide is adapted to my special needs, but you can follow it if you please or need; I’ll mark special those parts –like this– and close –/like this–. Everything after a # is a comment, the <> symbols means that you should fill that field with custom data.

–MicroPC–

In the grub screen type e, append nomodeset fbcon=rotate:1 to the line where you can see vmlinuz (not after \) then press Ctrl+x.

You can also rotate the screen by running echo 1 | tee /sys/class/graphics/fbcon/rotate after the system has been initialized, but you still need nomodeset because of screen drivers.

–/MicroPC–

Login with user root and password voidlinux.

Execute bash to get a proper interactive shell.

Set your keymap layout with loadkeys <layout> (as I’m a latino using a US keyboard I do use us-acentos).

Partition your disk with cfdisk

d to delete partitions

n to create new partitions

t to change partition types

W to write changes

q to quit

Do this: delete all partitions, create a new partition of 260M and set type to EFI System, then create a new partition with the rest of available space (default). Write and quit.
Format and mount root
(I’m assuming your hard drive is /dev/sda, you can check with lsblk)

mkfs.fat -F 32 /dev/sda1
mkfs.ext4 /dev/sda2 # this and next line not needed if you want LUKS encryption
mount /dev/sda2 /mnt

–LUKS–

Prepare the drive. I think this is not needed if your disk was encryped before and the passphrase was not compromised.

cryptsetup open --type plain -d /dev/urandom /dev/sda2 cryptroot # open partition
# Wipe all information safely. It's optional but recommended. It will take a while, wait until it throws "no space left on device" error.
dd if=/dev/zero of=/dev/mapper/cryptroot status=progress [bs=1M]
cryptsetup close cryptroot # close it

Encrypt. I use a keyfile, but you can use a password by ommiting the key file related instructions.

You can generate a 256 bytes random keyfile with openssl rand 256 > keyfile or make it more human-readable by appending -base after rand, be sure to save a copy of it!

It is wise to have more than one password / keyfile saved in different devices, so you don’t lose access if you lose your password device. You have been warned.

Some people think that you should have a password and a keyfile to be safe. I say passwords we are able to memorize are not trustable. Be sure to keep your secret keyfiles with you or on a safe place and don’t leave your drive in your laptop when you are not using it.

It’s recommended to echo 'hostonly=yes' > /etc/dracut.conf.d/hostonly.conf so it loads only required config, but this breaks my installation (codepage cp437 not found, related to fs-FAT, and keyboard becomes unresponsive). Let me know if you find out how to load the proper configuration on a MicroPC!